Skip to content

Commit c5f249e

Browse files
committed
minor fix
1 parent 9297b8b commit c5f249e

File tree

2 files changed

+8
-7
lines changed

2 files changed

+8
-7
lines changed

examples/src/keyrings/aws_kms_mrk_keyring_example.py

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# Copyright Amazon.com Inc. or its affiliates. All Rights Reserved.
22
# SPDX-License-Identifier: Apache-2.0
33
"""
4-
This example sets up the KMS MRK Keyring
4+
This example sets up the KMS MRK (multi-region key) Keyring
55
66
KMS MRK keyring interacts with AWS Key Management Service (AWS KMS) to create, encrypt,
77
and decrypt data keys using AWS KMS defined Customer Master Keys (CMKs).
@@ -17,6 +17,9 @@
1717
1818
For more information on how to use KMS keyrings, see
1919
https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/use-kms-keyring.html
20+
21+
For more info on KMS MRK (multi-region keys), see the KMS documentation:
22+
https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html
2023
"""
2124
import sys
2225

@@ -118,8 +121,6 @@ def encrypt_and_decrypt_with_keyring(
118121

119122
# 6. Create a keyring that will decrypt your data, using the same KMS MRK key replicated
120123
# to the second region. This example assumes you have already replicated your key
121-
# For more info on this, see the KMS documentation:
122-
# https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html
123124

124125
# Create a boto3 client for KMS in the second region.
125126
decrypt_kms_client = boto3.client('kms', region_name=decrypt_region)

examples/src/keyrings/aws_kms_mrk_multi_keyring_example.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
66
KMS MRK keyring interacts with AWS Key Management Service (AWS KMS) to create, encrypt,
77
and decrypt data keys using AWS KMS defined Customer Master Keys (CMKs).
8-
This example creates a KMS MRK Keyring and then encrypts a custom input EXAMPLE_DATA
8+
This example creates a KMS MRK Multi Keyring and then encrypts a custom input EXAMPLE_DATA
99
with an encryption context. This example also includes some sanity checks for demonstration:
1010
1. Ciphertext and plaintext data are not the same
1111
2. Encryption context is correct in the decrypted message header
@@ -51,7 +51,7 @@ def encrypt_and_decrypt_with_keyring(
5151
kms_key_id,
5252
mrk_replica_key_id,
5353
second_region)
54-
:param mrk_key_id: KMS Key identifier for an AWS KMS multi-Region key (MRK) located in your
54+
:param mrk_key_id: KMS Key identifier for an AWS KMS multi-region key (MRK) located in your
5555
default region
5656
:type mrk_key_id: string
5757
:param kms_key_id: KMS Key identifier for a KMS key, possibly located in a different region
@@ -119,7 +119,7 @@ def encrypt_and_decrypt_with_keyring(
119119
"Ciphertext and plaintext data are the same. Invalid encryption"
120120

121121
# 6. Decrypt your encrypted data using the same AwsKmsMrkMultiKeyring you used on encrypt.
122-
# It will decrypt the data using the generator KMS key since that is the first available
122+
# It will decrypt the data using the generator KMS MRK key since that is the first available
123123
# KMS key on the keyring that is capable of decrypting the data.
124124
plaintext_bytes, dec_header = client.decrypt(
125125
source=ciphertext,
@@ -138,7 +138,7 @@ def encrypt_and_decrypt_with_keyring(
138138

139139
# Demonstrate that a single AwsKmsMrkKeyring configured with a replica of the MRK from the
140140
# multi-keyring used to encrypt the data is also capable of decrypting the data.
141-
# Not shown in this example: A KMS Keyring created with `kmsKeyArn` could also
141+
# Not shown in this example: A KMS Keyring created with `kms_key_id` could also
142142
# decrypt this message.
143143
# (This is an example for demonstration; you do not need to do this in your own code.)
144144

0 commit comments

Comments
 (0)